We are in the process of building a secure network reference architecture for member firms as guidance. Are there any good examples I can use?

1.6k viewscircle icon2 Comments
Sort by:
Head of PMOa year ago

There's some material on this on NCSC's website.  One page of which is: Architecture and configuration - NCSC.GOV.UK and there is more if you search the site.    I've seen various examples at the different public authorities where I've worked over the years but they are rarely distributed widely.

VP of IT in Retaila year ago

I would focus on NIST and ISO/IEC 27001.

The NIST Framework - The National Institute of Standards and Technology (NIST) provides a framework for improving critical infrastructure cybersecurity. The NIST framework is notable for its focus on risk management and its adaptability, allowing it to be applied in a variety of contexts.

ISO/IEC 27001 - ISO/IEC 27001 is an international standard for information security. It provides a set of standardized requirements for an Information Security Management System (ISMS). The standard adopts a process-based approach for establishing, implementing, operating, monitoring, maintaining, and improving your ISMS.

Content you might like

Always required – Security must formally review and approve every change request.11%

Required for security-impacting changes – Security reviews only changes flagged as having potential security implications. Please comment : Who decides which changes require security review and which do not ? Is this determination manual or automated? How do you avoid gaps or oversights in this process ?82%

Not required – Security does not review changes submitted CAB/RAB by other teams. 7%

Risk-based or automated – Security involvement is determined by a tiered model or automated risk scoring within ITSM.

View Results

Statement coverage24%

Branch coverage43%

Fault-exposing potential41%

Risk-based prioritization47%

Requirements-based prioritization38%

Model-based prioritization15%

Other1%

Don't prioritize1%

View Results